-
### What happened?
CVE-2022-47629
CVE-2023-44487
CVE-2022-1271
We are receiving the above vulnerabilities for Jaeger due to which we are unable to use this on our production environment
### Steps…
-
**What steps did you take and what happened:**
Running Trivy operator with these ENV values
```
OPERATOR_TARGET_NAMESPACES:
OPERATOR_EXCLUDE_NAMESPACES:
OPERATOR_TARGET_WORKLOADS: pod,replicaset,…
-
---
# Bug Report or Design System update
- [x] I’ve searched for any related issues and avoided creating a duplicate issue.
## What happened
We have a web application that is using the VA De…
-
### Summary
Our current overview dashboard is aggregating and displaying data at the organization level, encompassing all repositories within the organization. To provide a more comprehensive view fo…
-
## Description
It seems that sometimes the way secrets are matched it captures a bit more/less of the text containing the secret as the value, which causes problems when we try to match them up to mi…
-
Please review the [Community Note](https://github.com/trufflesecurity/trufflehog/blob/main/.github/community_note.md) before submitting
### TruffleHog Version
HEAD
### Description
When using…
-
* **I'm submitting a ...**
- [ ] bug report
- [x] feature request
* **What is the current behavior?**
detect-secrets-hook gets a list of files as command line arguments.
* **What is the d…
-
## Expected Behavior
This project currently uses go 1.20 which is EOL and unsupported, see https://go.dev/doc/devel/release It also has security vulnerabilities which scanners such as Trivy repor…
-
The event processing in webhook-receive-post is not putting events "secret_scanning_alert" into queue, like "push" queue in queue.ts. This will risk lost of events "secret_scanning_alert".
Task:
…
-
Raw response from get a repo should have:
```json
"security_and_analysis": {
"advanced_security": {
"status": "enabled"
},
"secret_scanning": {
"status": "enabled"
…